Netinfo Security ›› 2015, Vol. 15 ›› Issue (2): 19-25.doi: 10.3969/j.issn.1671-1122.2015.02.004

Previous Articles     Next Articles

TANG Chun-ming, ZHENG Xiao-long   

  1. School of Mathematics and Information Science, Guangzhou University, Guangzhou Guangdong 510006, China
  • Received:2015-01-13 Online:2015-02-10 Published:2015-07-05

Abstract: Nowadays, with the development of science and technology, cloud computing gets more and more attentions and is put in use increasingly, and then the security problem of date storage appears. Therefore, cryptography related to the cloud storage has become a very hot topic in the academic circles. Users can enjoy the on-demand high quality services by using cloud storage. But, because users no longer physically occupy the date ,they can’ t ensure the correctness and the integrity of the date in the cloud computing. This paper proposes a privacy-preserving mechanism to ensure the privacies of the users, introduces a trusted third party auditor (TPA) to perform public audit, while checks the integrities of the outsourcing data. To securely introduce an effective TPA, the auditing process should bring no new security threats towards the users’ date privacies, and bring no additional online pressure to users. Especially, while the users’ date should be shared by a large number of users in the cloud, it must entrust the TPA to audit in order to ensure data not be tampered, and at the same time the TPA can not retrieve the entire data. Therefore, no matter the information or signature information on the data block, they are still confidential to TPA.

Key words: privacy-preserving, third party auditor(TPA), cloud audit, cloud storage, cloud computing

CLC Number: